Professional Documents
Culture Documents
Application of Computer Assisted Audit Techniques in Public Accounting Firm
Application of Computer Assisted Audit Techniques in Public Accounting Firm
Volume 11, Issue 5, May 2020, pp. 222-229, Article ID: IJM_11_05_022
Available online at http://www.iaeme.com/ijm/issues.asp?JType=IJM&VType=11&IType=5
Journal Impact Factor (2020): 10.1471 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6502 and ISSN Online: 0976-6510
DOI: 10.34218/IJM.11.5.2020.022
Mazlina Mustapha
Department of Accounting and Finance, Faculty of Economics and Management
Universiti Putra Malaysia, Selangor, Malaysia
ABSTRACT
Facing the industrial revolution 4.0, every profession in the world must improve,
every professional workforce involved in it, must begin to add one skill that is
computer literacy. This phenomenon certainly occurs also for the financial auditor
profession. Auditors are required to no longer only carry out the audit process
manually or traditionally but to use computerization. In auditing this is referred to as
computer assisted audit techniques. Our research is a qualitative study, we use
literature studies as secondary data and primary data collection techniques. Primary
data collection is done by observation to public accounting firms and conducting
interviews with auditors to find out how the application of audit software in their
environment. Our interviews include: understanding, constraints faced, and the
auditor's views regarding the audit software itself. In this study we obtained results
regarding the advantages and disadvantages of the computer assisted audit technique
and a review of its application in public accounting firms in Indonesia both the big
four and the non big four. Our research can be a reference or reference for
subsequent research in the field of audit and software.
Key words: Audit, software, industry, technique, computer, assisted
Cite this Article: Bambang Leo Handoko, Ang Swat Lin Lindawati and
Mazlina Mustapha, Application of Computer Assisted Audit Techniques in Public
Accounting Firm. International Journal of Management, 11 (5), 2020, pp. 222-229.
http://www.iaeme.com/IJM/issues.asp?JType=IJM&VType=11&IType=5
1. INTRODUCTION
Audit is an activity to reveal whether the information or activities that occur are not in
accordance with the benchmarks that have been designed so that it can produce information
about the cause of the discrepancy between the activity and the specified benchmarks. [1],
stated that the audit is selecting and reporting discrepancies between information and
standards through the collection and evaluation of evidence information.
It is undeniable that we live in an era that is fast paced and practical. The need for
computer technology is needed to support daily work from the simplest to the most
complicated. There are three eras of economic growth, namely the agricultural era, the
industrial era, and the information era. In the third era, information technology is very
important because it facilitates and enables companies to collect and analyze data and
information [2].
The practice of accounting implementation in the current era focuses on facilitating the
transformation of resources and methods. This allows the formation of companies on a
network form basis so that there is a fast and large movement of elements.
The development of information technology has led to practicality and convenience in
audit activities, namely Computer Assisted Audit Techniques (CATTs). CATTs is the use of
computer technology in audit activities to obtain audit evidence making it easier for auditors
to collect and analyze electronic-based information. Therefore it is important for auditors to
understand the workings of Computer Assisted Audit Techniques to use and evaluate
electronic-based data.
The Public Accountant Professional Standards (SPAP) also emphasized the need for an
auditor's understanding in examining a computer-based accounting system. This technique is
known as Computer Assisted Audit Techniques (CAATs). The use of CAATs will increase
the efficiency and effectiveness of auditors in carrying out audits by utilizing all capabilities
possessed by the computer. Combining this understanding of the importance of audit
expertise with computer-based information systems knowledge will result in a very
significant increase in the information system audit process [3]. The preparation of
information systems auditors to have these skills must be prepared in advance to be able to
carry out the tasks of an information system audit [4]. Actually in addition to ACL software
there are also other software such as IDEA, CA Panaudit Plus, Monarch Software and many
others, but most of the functions are the same, namely interrogating data that is processing
databases for specific purposes.
There are also considerations in the use of CAATs in every company in Indonesia. If
referring to Public Accountant Professional Standards cited in [5] include also in PSA No. 57
concerning Auditing in a Computer Information System Environment, in paragraphs 04
through paragraph 06 describes the level of skills and competencies that auditors must possess
when carrying out an audit in a computer information system environment and provides
guidance when delegating work to assistants with system skills computer information or when
using work carried out by other independent auditors or experts who have expertise in the
field of computer information systems Specifically, auditors must have sufficient knowledge
to plan, implement and use the results of the use of CAATs. The level of knowledge that the
auditor must have depends on the complexity and nature of the CAATs and the entity's
accounting system [6].
Therefore, the Auditor must realize that the use of CAATs in certain circumstances can
require that he has far more computer knowledge than he has in other circumstances.
The auditor must also consider the suitability of computer facilities and computer-based
business process systems as needed, to be considered by the auditor planning the use of the
CAATs for the client entity, so that the auditor has reasonable expectations that the CAATs
can be used during the audit.
Many computerized systems for carrying out certain tasks do not produce visible
evidence. So in this situation, it is not practical for the Auditor to do the testing manually.
2. LITERATURE REVIEW
2.1. Auditing
According to [7] is a systematic process for obtaining and evaluating evidence relating to
assertions about economic actions and events objectively to determine the level of
appropriateness between those assertions with the criteria that have been determined and
communicating the results to interested parties.
According to [8], in terms of the extent of the audit, the types of audits can be
distinguished from:
1. General Audit, which is a general audit of financial statements conducted by an
independent Public Accountant Office (KAP) with a view to providing an opinion on the
reasonableness of the financial statements as a whole.
2. Special Audit, which is a form of audit that is only limited to the request of the auditee
conducted by the Public Accounting Firm by giving an opinion on the part of the audited
financial statements, for example an examination of the company's cash receipts.
Still according to the same source, according to [8], in terms of the type of examination,
the types of audits can be distinguished from:
1. Operational Audit (Management Audit), which is an examination of a company's
operational activities, including accounting policies and operational policies that have been
determined by management with a view to knowing whether operations have been carried out
effectively, efficiently and economically.
2. Compliance Audit, which is an examination conducted to find out whether the company
has complied with the regulations and policies in force, both those stipulated by the
company's internal parties and external company.
3. Internal Audit, which is an examination conducted by the company's internal audit
department that includes the financial statements and accounting records of the company
concerned and compliance with management policies that have been determined.
4. Computer audit; which is an examination conducted by the Public Accounting Firm of
companies that process accounting data using the Electronic Data Processing (EDP) system.
3. RESEARCH METHODOLOGY
3.1. Type of Research
The research method used is qualitative research whose research procedures are descriptive
qualitative, namely by studying, describing, analyzing and explaining the data obtained
Conduct interviews with employees involved and take responsibility for the audit firm
operational activities of auditing client’s financial statement
b. Observation
Data collection is done by direct observation of the public accounting firm activities,
especially in the audit process using manual and computerized.
c. Documentation
Documentation is carried out to trace and vouch the documents related to activities in the
audit process
CAATs is a device and technique used to test (both directly and indirectly) the internal logic
of a computer application used to process data [12].
If the auditor chooses to use a computer-assisted audit technique, the auditor can choose
the approach it uses, i.e. whether to do application testing or do substantive testing.
If the auditor chooses to test the application, there are several approaches that can be taken
including:
Test Data. This method uses input data prepared by the auditor and tests the data with
a copy of the auditing application software. The results of the data processing will be
compared with the auditor's expectations. If there are inappropriate results, this might
be an indication of logic deviation or control mechanism.
Integrated Test Facility (ITF). It is an automated engineering approach that allows the
auditor to test the flow of logic and control of an application during normal operations.
Parallel Simulation (PS). This approach requires the auditor to create a program that
simulates certain key functions of the application being tested.
Meanwhile, to conduct substantive testing (for example transaction details or estimated
balances), the auditor can choose the technique:
Embedded Audit Module (EAM). Is a technique in which one or more specific
program modules are embedded in an application to record separately a series of
transactions that have been determined into a file that will be read by the auditor
Generalized Audit Software (GAS). Is an approach that uses a particular software that
is used to select, access, organize data for the benefit of substantive testing. This
approach allows the auditor to access and retrieve various data files into the computer
and then perform various tests as needed. This approach is the most popular technique
because it is relatively easier because there is no need for deep computational
engineering skills.
When viewed from the side of the internal logic testing process of an application, the data
test techniques, ITF, PS and EAM are the techniques of testing the application's internal logic
directly while the GAS technique is an indirect testing technique. GAS is called the indirect
testing technique because it is more likely to take the output from the application and then
reprocess it to test whether the output is in accordance with the specified test criteria. This
paper specifically discusses the use of GAS-based CAATs that is commonly used by public
accounting firms, especially large public accounting firms that really need the use of this
technique to speed up the completion of their audit work.
system applications, such as the use of test data to test the functioning of preprogrammed
procedures; Accessing files, i.e. the ability to read files with different records and different
formats; grouping data based on certain criteria, organize files, such as sorting and combining,
create reports, edit and format outputs, making equations with rational logical operations
(example: AND; OR; =; <>; <;>; and IF).
5. CONCLUSION
5.1. Conclusion
Computer Assisted Audit Techniques (CAATs) are the use of computers in inspection
activities. CAATs were a tool that helps inspectors in achieving examination objectives.
CAATs refers to special inspection procedures for testing information technology
components, namely data and programs. TABK has the usefulness or benefits, including
testing the details of transactions and balances, analytical review procedures, testing of data
(control of the test) for controlling the data, making and editing, making and editing files,
editing and editing, making and editing files, editing and editing, making and editing files,
editing and editing, making and editing files, editing and editing, making and editing files,
editing and editing.
In Indonesia itself, there are regulations for the adoption of CAATs applications. The
regulations include SPAP (2001) which defines Computer Information System (CIS), then
SPAP SA Section 335 Paragraph 03 on the impact of SIK environment, Article 1 Regulation
of the Minister of Finance Number 199 / PMK.03 / 2007, BPK Regulation Number 1 of 2007
concerning Standards for Inspection of State Finances (SPKN) Paragraph 56, and SPAP SA
Section 335 Paragraph 10 [15] which states the effectiveness and efficiency of audit
procedures is improved through the use of CAATs in obtaining and evaluating audit evidence.
The last thing is there is some weakness in TABK, namely cost, time, and auditor
competency, and computer literacy.
5.2. Suggestion
Since the world has entered the digital age wherever it has used technology, Indonesia must
continue to pursue and continue to develop its technology specifically in the field of auditing.
However, according to our point of view, CAATs in Indonesia has begun to be treated well
because in most companies, it is all by system, so the audit must also use the system to make
it easier.
Public accounting firm partners if you want to support the use of CAATs must be willing
to invest in software and hardware. Of course this is not cheap, but for the future, this
investment will enable the accounting firm to compete better. The effectiveness and efficiency
of the auditor's work increases. Availability of work with shorter time, means more work can
be handled, and more income for public accounting firms.
REFERENCES
[1] J. Bierstaker, D. Janvrin, and D. J. Lowe, “What factors influence auditors’ use of
computer-assisted audit techniques?,” Adv. Account., 2014.
[2] M. Mustapha and S. J. Lai, “Information Technology in Audit Processes: An Empirical
Evidence from Malaysian Audit Firms,” Int. Rev. Manag. Mark., vol. 7, no. 2, pp. 53–59,
2017.
[3] N. Mahzan and A. Lymer, “Examining the adoption of computer-assisted audit tools and
techniques,” Manag. Audit. J., vol. 29, no. 4, pp. 327–349, 2014.
[4] R. Widuri, B. L. Handoko, and I. E. Riantono, “Perception of Accounting Student on
Learning of Generalized Audit Software,” 2019.
[5] J. Peterson, “Auditor Independence,” Bus. Prof. Ethics J., 2018.
[6] J. B. Omonuk and A. A. Oni, “Computer assisted audit techniques and audit quality in
developing countries: Evidence from Nigeria,” J. Internet Bank. Commer., 2015.
[7] M. Abuaddous, H. Bataineh, and E. Alabood, “Burnout and auditor’s Judgment Decision
Making: An experimental investigation into control risk assessment,” Acad. Account.
Financ. Stud. J., vol. 22, no. 4, pp. 1–16, 2018.
[8] I. Pedrosa and C. J. Costa, “Statutory auditor’s profile and computer assisted audit tools
and techniques’ acceptance: Indicators on firms and peers’ influence,” in ACM
International Conference Proceeding Series, 2014.
[9] N. Gambetta, M. A. García-Benau, and A. Zorio-Grima, “Data analytics in banks’ audit:
The case of loan loss provisions in Uruguay,” J. Bus. Res., 2016.
[10] B. L. Handoko, S. Ariyanto, and D. L. Warganegara, “Perception of financial auditor on
usage of computer assisted audit techniques,” in Proceedings - 3rd International
Conference on Computational Intelligence and Applications, ICCIA 2018, 2019.
[11] U. Sekaran and R. Bougie, “Research Methods For Business. A Skill Builing Approch.
7th Edition,” Book, 2016.
[12] K. Kozhakhmet, G. Bortsova, A. Inoue, and L. Atymtayeva, “Expert system for security
audit using fuzzy logic,” in CEUR Workshop Proceedings, 2012.
[13] R. Ghani, N. Azizi, and S. Zabedah, “Adoption of Computer-Assisted Audit Tools and
Techniques ( CAATTs ): An Exploratory Study in Audit Firms,” Int. Conf. Account. Stud.
2016, no. August, pp. 35–40, 2016.
[14] “Big Data in Auditing for the Future of Data Driven Fraud Detection,” Int. J. Innov.
Technol. Explor. Eng., 2020.
[15] Ikatan Akuntan Indonesia, “SA Seksi 314 Pertimbangan auditor atas kemampuan entitas
dalam mempertahankan kelangsungan hidupnya,” Ikat. Akuntan Indones., 2001.
[16] Jinali Gandhi, Umang Shah and Dharmesh Mistry. An Exposition of Modern Information
System Audits. International Journal of Information Technology and Management
Information System, 6(2), pp. 11-20. 2015.
[17] Navanath Jadhav and L.Laxmi, Privacy-Preserving Public Auditing for Secure
Cloudstorage, International Journal of Computer Engineering and Technology, 5(7), pp.
36-42, 2014.